MSS
MSS
Executive Summary
Managing threats and maintaining the security and integrity of an infrastructure is becoming increasingly difficult for most organizations. With the rapid development of Internet Technologies and Emerging Architectures make this more and more difficult. During the race for the bleeding edge technologies and rapid versioning, many organizations experience a variety of difficulties. The technological isolation (obsolete technologies) and delay of migration caused by the expenses or due to the financial status increase problems for economic growth. Small and Medium sized businesses suffer from the issues more and more rather than enterprise level businesses. The better the infrastructure, the greater the impact of a company s technology investments on growth. Small and Mid-Sized businesses play an important character of a nation s economic development, especially developing countries and recent years it is the same for developed nations. The average growth rate is getting increasingly higher for the Small and Mid-Sized businesses. The most interesting fact is that these businesses highly depend on Internet Technologies such as Internet Marketing and low cost Cyber Infrastructure. No businesses can dwell without a coherent strategy and the existence and survival will be determined by new parameters like adequate technology and infrastructure which will assist companies for a smooth and flexible execution and growth. With the development of these areas, the necessity of skilled people and the monitory value of high quality workers which will engage in deploying, managing and maintaining the new/existing business infrastructure added more pressure to the existing strategy. The lack of quality workers due to their higher demand and salary requirements the Small and Mid-Sized businesses were opened to the cyber space with a severe problem related to The Information Security. Today, a number of companies have adopted many recent technologies including Virtualization, Cloud and Managed Service Providers (MSP) which will increase Revenues rapidly due to the cost. The lack of skilled people, shortage of knowledge and capital, managerial practises, inadequate strategies for adapting technology vastly increased the security risks. The emergence of Managed Security Provider Services has successfully addressed the issue and recently many small and mid size business owners have agreed that this will heal the headaches they have experienced throughout these years.
Small and Mid-sized businesses are quite efficient and effective when compared to Large Organizations when considering several areas. y y y y y Build a strong Niche More Control Flexible and Adapt changes faster Better communications Better collaboration
Each of these areas has significantly improved with Information and Communication Technology. To maintain the integrity of the areas a more flexible and smooth infrastructure was required. Managed Service Providers have become the dominant player to ensure the requirements. Today, most of the small and mid-sized businesses rely on the MSPs.
Information Security
Securing information is becoming more and more difficult with the emergence of numerous bleeding edge technologies and versioning. Recent technologies such as Virtualization and Cloud Computing will improve many businesses and reduce a large quantity of resource requirements thus enabling the adaptation by small and mid-sized business units. The knowledge does not come for free. The IT Professionals, Systems Engineers, Communication Engineers, Network Engineers and Security Engineers have to upgrade their knowledge time to time and this will increase the value of the individual which makes a serious Shortage of Skilled people for the small and mid-sized organizations. Rather than hiring individuals with necessary knowledge, they have to select a professional which has partial education, knowledge and experience in all the fields. Unfortunately, many IT Professionals and even Systems Administrators do not have proper knowledge to secure the information and maintain the integrity while ensuring the confidentiality.
secured. When considering the cloud, not only the hosted systems but also the Host (which is the cloud) has to be protected using the provided mechanisms. Virtualization Virtualization era has made the life easier for many organizations. Especially when considering the hardware requirements which can be expensive. Special knowledge and experience required to manage and maintain such systems. A number of Virtualization services and platforms emerged during recent years. Technology specialists who have expertise in these areas are less in numbers and have higher expectation of salaries which will not be a good option for small scale and medium sized businesses. When considering these Technologies, Risk factor, Skills, Human factor, CIA triad, Cost and Compliance Managed Security Services becomes an elegant option.
y y
y y y y y y y y
Benefits
y Cost Cost for MSSPs are lower than employing on-site work force. With infrastructures and customers spread around the globe, MSSPs are able to reduce costs by spreading the cost among numerous clients. Skills MSSPs hire qualified professionals and have a better insight into emerging threats and mitigation procedure due to the fact that the spreading of services and customer base. Compliance Addressing and absorbing regulations will be handled by MSSPs as required. MSSPs are often well connected to law enforcement agencies around the world. Work Force (Security Awareness) Recruiting, Training and Re-training the security staff will cost more for organizations. With MSSPs, clients never face Skill Shortage Issues due to the fact that they have professionals with knowledge in latest technologies. This will ensure the security budget a constant value and avoid spikes. Availability and Performance 24x7x365 services and regular optimizations. Consolidation Managing and Monitoring various devices and technologies, security controls can be overwhelming for new businesses and who recently adapted new infrastructures. By using services from an MSSP, the potential risks due to obsolete and unmanaged systems, un-patched and vulnerable systems can be mitigated due to the fact that service providers continuously Monitor and Assess their infrastructure. MSSPs offer Hardware, System and Software update services. Facilities Managed SOCs (Security Operations Control Centres). Accountability and Auditability
y y y
y y
y y
y y y
y y
Evaluating a MSSP
A properly detailed proposal is required prior to evaluate the service provider. This proposal from MSSPs must address all the requirements and provide these details including: y y y y y y y y Reputation A MSSP must have proper reputation and it has to be visible to public. Clients and Referrals A list of contact of current clients have to be available to new clients. nowledge and Experience Proven quality and proficiency of the professionals have to be included. Financial Status A MSSP has to be financially strong in order to survive on a disaster situation. Capabilities The MSSP has to address each technological requirement and has to agree to provide them timely and with confidence. Strategy A clear operation and support strategy and incident management. Trusted Third-party (tired) Contractors If MSSPs maintain several tires and third party contactor, there has to be a procedure to perform checks on their background as well. QoS Architecture of the MSSP, Quality of Professionals, Assets, Hardware, Software, Availability, Scalability and Clear view of Layers (services), Quality of Auditing, Reporting and Privacy have to be evaluated. Upgrades and Migrations MSSPs have to have packages which will suite customers according to their requirements as well as according to laws and regulations. Disaster Recovery Strategy Clear Disaster Recovery Procedures, Tools, Assets, Workforce.
y y
A service-level agreement (SLA) is a contract between a network service provider and a customer that specifies, usually in measurable terms, what services the network service provider will furnish. Many Internet service providers (ISP)s provide their customers with an SLA. More recently, IS departments in major enterprises have adopted the idea.
[TECHTARGET 01]
Service Level Agreement (SLA) (ITILv3): An Agreement between an IT Service Provider and a Customer. The SLA describes the IT Service, documents Service Level Targets, and specifies the responsibilities of the IT Service Provider and the Customer. A single SLA may cover multiple IT Services or multiple Customers. [ITIL v2, v3] Service Level Agreement (SLA) (ITILv2): A formal, negotiated document that defines (or attempts to define) in quantitative (and perhaps qualitative) terms the service being offered to a Customer. Confusion must be avoided over whether the quantitative definitions constitute thresholds for an
acceptable service, targets to which the supplier should aspire or expectations that the supplier would strive to exceed. Any metrics included in a Service Level Agreement (SLA) should be capable of being measured on a regular basis and the SLA should record by whom. Typically it will cover: service hours, service availability. Customer support levels, throughputs and responsiveness, restrictions, functionality and the service levels to be provided in a contingency. It may also include information on security, charges and terminology. Apart from regular periodic reviews, SLAs should be renegotiated whenever a business service is subject to a change of requirement or there is an inability to deliver to requirement. [ITIL v2, v3]
SLA must be carefully examined before the contract. It must cover each and every aspect of the service which will be provided by MSSPs.
y y y y y y y y y y y y y
Extensive usage of Cyber Resources and Integration of IT Capability of reaching Higher Performance and QoS expectations Sustainability Regular Unmanaged Security Threats Extensive Financial Benefits Flexibility to Address and Adapt Marketing Changes Address Scalability requirements with readily available assets and technologies Readily Available Solutions and Packages No additional Time Consumption and Effort Tend to use Outsourcing regularly No additional crew or training cost 24x7 Operations Collaborative effort
Managed Security Services are becoming a one of the best options to manage, maintain and optimize Information Security. For many large organizations this can be an option but for small and medium sized businesses MSS have become a main component. With proper initiation and relationship management (lifecycle of the services) MSSs can become a lifesaver. Not just the profit but the sensitive information leakages can be mitigates successfully. Today many small and midsized businesses benefit from such services. Giants like IBM, AT&T are already providing a quality services in terms of security as Manages Security Service Providers. There are many cost effective solutions and reliable service providers available to choose from. Starting an MSS firm is a perfect idea according to the market researches. It has many challenges, has to deal with many areas such as Financial Services, Health Services, Manufacturing Services, Public Sector and many others, but, nothing is way beyond the available resources, with recent innovations in ICT. It is a highly profitable area and a life time opportunity to reach the world and to become an owner of a world class firm.
Conclusion
ICT has become a main component of the business process of Small to Medium Businesses and plays a vitally important role. It is a main part of the business strategy which will tie the unequal business components (departments as an example) together to perform an efficient and effective function. ICT is one of the main forces that are strengthening each department thus reducing many costs involved in the entire process which will enable organizations to reach the expected profits without much hassle. With less human work force, integrated technologies and components functioning 24x7, the work load and the needed net effort is reduced extensively for business owners. But these technologies and automations will be effective and efficient if and only if they keep the Integrity, Confidentiality and Availability. That has become the most difficult issue to be addresses with recent cyber threats and system vulnerabilities and cost involved with securing business infrastructures. This is why MSSs become a lifesaver. With MSSs this is not a dream any more. Many Small and Medium scaled businesses face a huge pressure from large competitors. But with a proper ICT strategy absorbed into the business process and a high tech infrastructure, less operation time, searching and exploiting weaknesses of large competitors and most importantly closing the information security gaps will reduce the pressure and make the business more improved. While ICT fuels the ongoing business, MSSs will guarantee the Integrity and Availability so the organizations can integrate more and more IT components to the business and to keep conquering the world further via the cyber space. With a properly maintained relationship with a MSSP will ensure the business profits as well as uptime and proper functionality. Information leakage and financial disruption due to information security reasons can be mitigates from a collaborative effort with a MSSP. Many Small to Medium organizations nowadays integrate MSSs without a doubt and thanks to many service providers they survive in the wild cyberspace. Many highest rated and well reputed Medium to Large scale MSSPs with quality services available around the globe. The Information Security is some mouse clicks away. It s the time for a new change!